The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[FLSA-2005:168326] Updated util-linux and mount packages fix security


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Sun, 18 Dec 2005 00:17:49 -0500
From: Marc Deslauriers <marcdeslauriers@videotron.ca.>
Subject: [FLSA-2005:168326] Updated util-linux and mount packages fix security
 issue
To: [email protected], [email protected]
Message-id: <43A4F0FD.50804@videotron.ca.>
MIME-version: 1.0
Content-type: multipart/signed; micalg=pgp-sha1;
 protocol="application/pgp-signature";
 boundary=------------enigC336AC2721E26776046DE278
X-Accept-Language: en-us, en
X-Enigmail-Version: 0.92.0.0
User-Agent: Mozilla Thunderbird 1.0.7-1.1.fc4 (X11/20050929)
X-Virus-Scanned: antivirus-gw at tyumen.ru

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigC336AC2721E26776046DE278
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

---------------------------------------------------------------------
               Fedora Legacy Update Advisory

Synopsis:          Updated util-linux and mount packages fix security
                   issue
Advisory ID:       FLSA:168326
Issue date:        2005-12-18
Ключевые слова: , , , , , , , , , Bugfix,  (найти похожие документы)
Product: Red Hat Linux, Fedora Core CVE Names: CVE-2005-2876 --------------------------------------------------------------------- --------------------------------------------------------------------- 1. Topic: Updated util-linux and mount packages that fix a security issue are now available. The util-linux package contains a large variety of low-level system utilities that are necessary for a Linux system to function. The mount package contains the mount, umount, swapon and swapoff programs. 2. Relevant releases/architectures: Red Hat Linux 7.3 - i386 Red Hat Linux 9 - i386 Fedora Core 1 - i386 Fedora Core 2 - i386 3. Problem description: A bug was found in the way the umount command is executed by normal users. It may be possible for a user to gain elevated privileges if the user is able to execute the "umount -r" command on a mounted file system. The file system will be re-mounted only with the "readonly" flag set, clearing flags such as "nosuid" and "noexec". The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-2876 to this issue. All users of util-linux and mount should upgrade to these updated packages, which contain a backported patch to correct this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via yum and apt. Many people find this an easier way to apply updates. To use yum issue: yum update or to use apt: apt-get update; apt-get upgrade This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. This assumes that you have yum or apt-get configured for obtaining Fedora Legacy content. Please visit http://www.fedoralegacy.org/docs for directions on how to configure yum and apt-get. 5. Bug IDs fixed: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168326 6. RPMs required: Red Hat Linux 7.3: SRPM: http://download.fedoralegacy.org/redhat/7.3/updates/SRPMS/util-linux-2.11n-12.7.3.2.legacy.src.rpm i386: http://download.fedoralegacy.org/redhat/7.3/updates/i386/mount-2.11n-12.7.3.2.legacy.i386.rpm http://download.fedoralegacy.org/redhat/7.3/updates/i386/util-linux-2.11n-12.7.3.2.legacy.i386.rpm http://download.fedoralegacy.org/redhat/7.3/updates/i386/losetup-2.11n-12.7.3.2.legacy.i386.rpm Red Hat Linux 9: SRPM: http://download.fedoralegacy.org/redhat/9/updates/SRPMS/util-linux-2.11y-9.2.legacy.src.rpm i386: http://download.fedoralegacy.org/redhat/9/updates/i386/mount-2.11y-9.2.legacy.i386.rpm http://download.fedoralegacy.org/redhat/9/updates/i386/util-linux-2.11y-9.2.legacy.i386.rpm http://download.fedoralegacy.org/redhat/9/updates/i386/losetup-2.11y-9.2.legacy.i386.rpm Fedora Core 1: SRPM: http://download.fedoralegacy.org/fedora/1/updates/SRPMS/util-linux-2.11y-29.2.legacy.src.rpm i386: http://download.fedoralegacy.org/fedora/1/updates/i386/mount-2.11y-29.2.legacy.i386.rpm http://download.fedoralegacy.org/fedora/1/updates/i386/util-linux-2.11y-29.2.legacy.i386.rpm http://download.fedoralegacy.org/fedora/1/updates/i386/losetup-2.11y-29.2.legacy.i386.rpm Fedora Core 2: SRPM: http://download.fedoralegacy.org/fedora/2/updates/SRPMS/util-linux-2.12-19.1.legacy.src.rpm i386: http://download.fedoralegacy.org/fedora/2/updates/i386/util-linux-2.12-19.1.legacy.i386.rpm 7. Verification: SHA1 sum Package Name --------------------------------------------------------------------- 437139c00fbc4109ea3cd66b88a778a023d07298 redhat/7.3/updates/i386/mount-2.11n-12.7.3.2.legacy.i386.rpm e39b80b435a545f87878cb2d4f6e89d89ec2c88f redhat/7.3/updates/i386/util-linux-2.11n-12.7.3.2.legacy.i386.rpm 0c671214cb28d21b71917d04e4cdce3240515b45 redhat/7.3/updates/i386/losetup-2.11n-12.7.3.2.legacy.i386.rpm a35553671d54999b0929f42a1283252b1cab1d18 redhat/7.3/updates/SRPMS/util-linux-2.11n-12.7.3.2.legacy.src.rpm cbe71d4ed7c39c0ed186a548c194c44e3328595b redhat/9/updates/i386/mount-2.11y-9.2.legacy.i386.rpm 926ae6d1c9f6d5309ab24c712cbe2a3ec97bba1c redhat/9/updates/i386/util-linux-2.11y-9.2.legacy.i386.rpm 969d19231dc24415f7d761539b59ba772c716a36 redhat/9/updates/i386/losetup-2.11y-9.2.legacy.i386.rpm 9ac87483879c1df0ed9c100081e19b7614af8f79 redhat/9/updates/SRPMS/util-linux-2.11y-9.2.legacy.src.rpm 881c066cf8ec3aa25450a7e8db2f43e55faaef40 fedora/1/updates/i386/mount-2.11y-29.2.legacy.i386.rpm f1b2f60ee7b5fb3149ab3b36133c930c6eecb788 fedora/1/updates/i386/util-linux-2.11y-29.2.legacy.i386.rpm 501380711d59e946f1dab5a40b0906525393d766 fedora/1/updates/i386/losetup-2.11y-29.2.legacy.i386.rpm 65519afd06a882abad31b847ad7053936dfd0ef4 fedora/1/updates/SRPMS/util-linux-2.11y-29.2.legacy.src.rpm 72c70f92397f84a3f021c6cef964fa0fb9b8cc57 fedora/2/updates/i386/util-linux-2.12-19.1.legacy.i386.rpm 2c93eefe88d57118fc2ddfee7fd5949e3d58c38f fedora/2/updates/SRPMS/util-linux-2.12-19.1.legacy.src.rpm These packages are GPG signed by Fedora Legacy for security. Our key is available from http://www.fedoralegacy.org/about/security.php You can verify each package with the following command: rpm --checksig -v <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the sha1sum with the following command: sha1sum <filename> 8. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2876 9. Contact: The Fedora Legacy security contact is <secnotice@fedoralegacy.org.>. More project details at http://www.fedoralegacy.org --------------------------------------------------------------------- --------------enigC336AC2721E26776046DE278 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFDpPD9LMAs/0C4zNoRAiEgAJ9A1p7lXNBnVeOLm6zp5a8QyiL3LACfc2S5 WIoNViAIo8Y82n3OSc+vtGg= =QwTg -----END PGP SIGNATURE----- --------------enigC336AC2721E26776046DE278--

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру